CN108521399A - A kind of video monitoring safety cut-in method based on equipment feature recognition and white list - Google Patents

A kind of video monitoring safety cut-in method based on equipment feature recognition and white list Download PDF

Info

Publication number
CN108521399A
CN108521399A CN201810157447.8A CN201810157447A CN108521399A CN 108521399 A CN108521399 A CN 108521399A CN 201810157447 A CN201810157447 A CN 201810157447A CN 108521399 A CN108521399 A CN 108521399A
Authority
CN
China
Prior art keywords
management host
end management
white list
cpu
device type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810157447.8A
Other languages
Chinese (zh)
Inventor
傅如毅
汪剑波
龚昌北
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd
Original Assignee
ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd filed Critical ZHEJIANG YUANWANG TELECOM TECHNOLOGY Co Ltd
Priority to CN201810157447.8A priority Critical patent/CN108521399A/en
Publication of CN108521399A publication Critical patent/CN108521399A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a kind of video monitoring safety cut-in method based on equipment feature recognition and white list, this method is based on the front end management host being connect with access device, the front end management host is equally connect by center switch with server with general switch, the CPU that function is detected and controlled with illegal access and unauthorized access is provided in the front end management host, multiple outside ports connected for access device are provided on the front end management host, each outside port is connect with the CPU of front end management host, the server can issue white list and device type identification feature library by center switch to every front end management host.The present invention combines the functions such as the common illegal access detection for realizing access device, the counterfeit detection of equipment, unauthorized access detection, automatic quickly device type identification and mandate, the mandate of gadget access, the mandate of emergency set using white list mechanism and device type feature recognition.

Description

A kind of video monitoring safety cut-in method based on equipment feature recognition and white list
【Technical field】
It is the present invention relates to the technical field of video surveillance network safety, more particularly to a kind of based on equipment feature recognition and white The video monitoring safety cut-in method of list.
【Background technology】
Current video monitoring system is deeply applied to each industry field concerning national economy, wherein being also no lack of relationship The important department of national security.It is the information with highly confidential value that this, which means that these video datas all, once by It illegally steals, consequence is hardly imaginable.Therefore it for important department as each video surveillance network especially such as public security, needs Perfect technological means is taken to prevent what security threat from bringing to seriously affect.
Video monitoring equipment deployment place is mostly exposed to the public places such as road, block, is easily maliciously invaded.Video Monitoring system has come into IPC (web camera) epoch, and front end camera only needs one IP address of setting can be straight It is connected in succession in video private network.When front end, camera is deployed in the wide free space in outdoor, easily by unauthorized personnel's object Reason contact, to cause illegal invasion, equipment counterfeit and unauthorized access.So one kind can be detected with automatic identification equipment feature Whether equipment is counterfeit, and the means of illegal invasion and unauthorized access is blocked to be very important.
【Invention content】
It is an object of the invention to overcome above-mentioned the deficiencies in the prior art, provide a kind of based on equipment feature recognition and white name Single video monitoring safety cut-in method, aims to solve the problem that video monitoring equipment is easily maliciously invaded in the prior art, is caused Illegal invasion, destruction and unauthorized access, the low technical problem of video monitoring system safety.
To achieve the above object, the present invention proposes a kind of video monitoring safety based on equipment feature recognition and white list Cut-in method, this method are exchanged based on the front end management host being connect with access device, the front end management host with common Machine is equally connect by center switch with server, is provided in the front end management host with illegal access and non- The CPU of method access detection and control function is provided with multiple outsides connected for access device on the front end management host Port, each outside port are connect with the CPU of front end management host, and the server can be by center switch to every Platform front end management host issues white list and device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device, Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Enter less than if if matching white List matching treatment returns to invalid device type and numbers if it fails to match for white list, and front end management host CPU executes action according to user configuration, goes to S5;If white list successful match, goes to S6;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification It levies in library, and goes to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent, And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When When thering is access device to access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow When abnormal, report and alarm.
Preferably, the white list content includes:MAC Address, IP address, protocol type and port numbers, user is also The white list on same front end management host can be allocated by server, is separately provided for each outside port white List.
Preferably, the device type identification feature library includes:Device type number, device type title, equipment The authorization message of type protocol feature, port numbers, message length and device type number, the device type protocol characteristic packet Protocol number is included, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset letter Breath.
Preferably, in the S2 and S4, if user configuration is alarm, the CPU of front end management host is sent Warning information;If user configuration is to block and alert, the CPU of front end management host directly blocks the access device logical Letter, and send a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
Preferably, the front end management host and general switch are communicated by a smooth cat with center switch respectively Connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
Preferably, the general switch can be substituted for front end management host, with center switch communication link It connects.
Beneficial effects of the present invention:Compared with prior art, provided by the invention a kind of based on equipment feature recognition and white The video monitoring safety cut-in method of list carries out Port Mirroring to access device by front end management host, message analysis, sets The functions such as standby feature recognition, white list management realize that illegal access, equipment be counterfeit and unauthorized access detects and controls; And access device can be blocked to communicate or only send a warning message etc. processing automatically according to user configuration, using white list mechanism and set Standby type feature identification combines the common illegal access detection for realizing access device, the counterfeit detection of equipment, unauthorized access inspection The functions, relatively biography such as survey, automatic quickly device type identification and mandate, the mandate of gadget access, the mandate of emergency set The video monitoring system of system has the following advantages that:
1) secure accessing directly accomplishes front end management host port, can automatically rapidly identification equipment type, find it is illegal It accesses and blocks, detect counterfeit equipment and access and block, automatically update asset identification library, gadget insertion authority, emergent award Power processing etc.;
2) environment in an effective safety can be formed, while all being found and being blocked in up going port and down going port;
If 3) all deploy front end management host, it can ensure access safety in total system.
The feature and advantage of the present invention will be described in detail by embodiment combination attached drawing.
【Description of the drawings】
Fig. 1 is the layout of the video monitoring network system of the embodiment of the present invention;
Fig. 2 is a kind of video monitoring safety cut-in method based on equipment feature recognition and white list of the embodiment of the present invention Flow chart.
【Specific implementation mode】
In order to make the objectives, technical solutions and advantages of the present invention clearer, below by accompanying drawings and embodiments, to this Invention is further elaborated.However, it should be understood that the specific embodiments described herein are merely illustrative of the present invention, The range being not intended to restrict the invention.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to keep away Exempt from unnecessarily to obscure idea of the invention.
Refering to fig. 1 and Fig. 2, the embodiment of the present invention provide a kind of based on the video monitoring of equipment feature recognition and white list peace Full cut-in method, this method are handed over based on the front end management host being connect with access device, the front end management host with common Change planes and equally connect with server by center switch, be provided in the front end management host with illegal access and Unauthorized access detects and controls the CPU of function, be provided on the front end management host it is multiple connected for access device it is outer Portion port, each outside port are connect with the CPU of front end management host, and the server can pass through center switch pair Every front end management host issues white list and device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device, Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code.
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Enter less than if if matching white List matching treatment returns to invalid device type and numbers if it fails to match for white list, and front end management host CPU executes action according to user configuration, goes to S5;If white list successful match, goes to S6.
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification It levies in library, and goes to S5.
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent, And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6.
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When When thering is access device to access front end management host, then S1 is back to.
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow When abnormal, report and alarm.
Wherein, the white list content includes:MAC Address, IP address, protocol type and port numbers, user can also The white list on same front end management host is allocated by server, white name is separately provided for each outside port It is single;The device type identification feature library includes:Device type number, device type title, device type protocol characteristic, end The authorization message of slogan, message length and device type number, the device type protocol characteristic includes protocol number, each Device type protocol characteristic includes one or more features code, condition code mask, condition code offset information.
In embodiments of the present invention, in the S2 and S4, if user configuration is alarm, front end management host CPU sends a warning message;If user configuration is to block and alert, the CPU of front end management host directly blocks the access Equipment communicates, and sends a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment It is counterfeit ".Wherein, user configuration determines that execute access device Communication Block is controlled by two-layer retransmitting table.
In embodiments of the present invention, S2 access devices identify, are to determine that the access is set by the identification of device type feature Standby is what kind of equipment, for example is the equipment of which production, what kind of equipment;The legal identification of S3 equipment is into one It walks and authority checking is carried out to the type of the equipment, determine whether the access device is legitimate device by mandate, but more than Two steps can not detect whether the access device is counterfeit equipment, and the personation identification of S4 equipment can be according to the IP of access device Address and MAC Address (embedding a unique MAC Address when each network equipment (such as network interface card, hub, router) production) Matched with device type identification feature library whether consistent and compatibility relation, whether the equipment of automatic detection access is counterfeit Equipment.For example, when match it is inconsistent when, there are it is following the fact that, i.e., the network interface card in the access device carried out replacement, Then the MAC Address of the access device is exactly the MAC Address of the network interface card, if the network interface card be by certification can with the access device into Row is matched, means that the access device and the MAC Address are compatible, it can be assumed that being non-counterfeit devices;Otherwise incompatible, it can It is exactly counterfeit devices to regard as the access device.
Identification by device type feature and the mandate to device type, we can be with the equipment that automatic identification accesses No is the legitimate device for passing through mandate, whether the equipment that can also detect access automatically is counterfeit equipment.But either white name All there is certain defect and deficiency in monotype or equipment feature recognition pattern.The manual typing of white list imports all by hand It needs to artificially collect access device information, although finding that the addition of one key of window phase substantially increases the efficiency artificially collected automatically, But window phase how long is properHow wherein mixed illegality equipment rejectsWhat window phase was subsequently added or replaced How equipment is addedIt would therefore be desirable to be realized by device type feature recognition and according to device type mandate automatic, fast Prompt, easily admission control.But device type feature recognition or inadequate is only leaned on, because of the receipts of device type feature Collection, update, the period of feature message and third party sdk opening status etc. all more or less affect part access and set Standby feature recognition.Therefore, by the way that white list mechanism and device type feature recognition are combined common realization access device Illegal access detection, the counterfeit detection of equipment, unauthorized access detection, automatic quickly device type identification and authorize, set temporarily The functions such as the mandate of standby access, the mandate of emergency set.
Further, the front end management host and general switch are communicated by a smooth cat with center switch respectively Connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
In embodiments of the present invention, camera is connect as access device with the outside port on front end management host, In, the outside port being connect with camera uses RJ45 interfaces, the outside port being connect with light cat to use RJ45-UP interfaces, tool Body utilization is as follows, refering to fig. 1:
1) unauthorized access access device, is accessed from the RJ45 mouths of front end management host, at this point, front end management host analysis Mirror image this paper of the port, if it find that the access device puts to the proof information not in device type identification feature library, then further Match white list;If it fails to match for white list, (two-layer retransmitting table control) is communicated according to the direct blocking equipment of user configuration And " illegal access " warning information is sent, or only send " illegal access " warning information.
2), if it find that according to IP address of equipment and MAC Address from front end management host local or the equipment class of server What the device type that is obtained in type identification feature library and being put to the proof according to equipment obtained in information from device type identification feature database sets Standby Type-Inconsistencies then directly block the access device to communicate and send " equipment is counterfeit " warning information or only according to user configuration Send " equipment is counterfeit " warning information.If it is the known device type equipment being newly added, then before the facility information being added to It holds in managing main frame local or the asset identification library of server.
3) access device of unauthorized access, is accessed from the RJ45 mouths of general switch, the access device of the unauthorized access The data for the other-end for being front end management host can be accessed not, but if being accessed by front end management host RJ45-UP The data of the front end management host, the mirror image of the front end management host analysis port is herein.If it find that the access device is lifted Information is demonstrate,proved not in device type identification feature library, then further matches white list, if also it fails to match for white list, basis User configuration executes devices block and alerts and still only alerts;If in device type number and device type identification feature library It is inconsistent, then according to user configuration execute devices block and alert or only alert.
4) access device of unauthorized access, is accessed from the RJ45 mouths of center switch, which can be accessed It is not the data of the other-end of front end management host, but if accessing the front end management by front end management host RJ45-UP The data of host, the mirror image of the front end management host analysis port herein, do not exist if it find that the access device puts to the proof information In device type identification feature library, then further matching white list is held if also it fails to match for white list according to user configuration Row devices block and alert still only alert;If inconsistent in device type number and device type identification feature library, Devices block is then executed according to user configuration and alerts or only alerts.
In embodiments of the present invention, the general switch can be substituted for front end management host, be exchanged with center Machine communicates to connect.When all deploying front end management host, then it can ensure access safety in total system, realize video monitoring comprehensively The safety of network.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention Any modification, equivalent replacement or improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (6)

1. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list, it is characterised in that:This method base In the front end management host being connect with access device, the front end management host is equally handed over by center with general switch It changes planes and is connect with server, be provided in the front end management host and detect and control work(with illegal access and unauthorized access Can CPU, be provided with multiple outside ports connected for access device on the front end management host, each outside port is equal It is connect with the CPU of front end management host, the server can issue every front end management host by center switch White list and device type identification feature library, this method are as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, front end The CPU of managing main frame starts Port Mirroring poll, according to the sequence of front end management host outside port, successively by message mirror As managing mouth to CPU, the CPU of front end management host analyzes mirror image message, obtains the information of each access device, including Access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host is according to the condition code of access device in device type identification feature library In matched, if matched arrive, returning equipment type number, and go to S3;Enter white list less than if if matching Matching treatment returns to invalid device type number, and the CPU roots of front end management host if it fails to match for white list Action is executed according to user configuration, goes to S5;If white list successful match, goes to S6;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return in device type identification feature It is matched in library, verifies the authorization message of the device type, then tentatively confirm that the access device is legal if the verification passes Authorisation device, and go to S4;If verification does not pass through, the information of the access device is added to device type identification feature library In, and go to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching unit Type identification feature database and does not have if the device type number returned and identifying inconsistent in device type identification feature library There is compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and goes to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When connecing When entering equipment access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow be abnormal When, report and alarm.
2. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1, It is characterized in that:The white list content includes:MAC Address, IP address, protocol type and port numbers, user can also pass through Server is allocated the white list on same front end management host, and white list is separately provided for each outside port.
3. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1, It is characterized in that:The device type identification feature library includes:Device type number, device type title, device type agreement The authorization message of feature, port numbers, message length and device type number, the device type protocol characteristic includes agreement Number, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset information.
4. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1, It is characterized in that:In the S2 and S4, if user configuration is alarm, the CPU of front end management host sends a warning message; If user configuration is to block and alert, the CPU of front end management host directly blocks the access device to communicate, and sends announcement Alert information, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
5. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1, It is characterized in that:The front end management host and general switch are communicated to connect by a smooth cat and center switch respectively, and It can be communicated to connect between different front end management hosts, between front end management host and general switch.
6. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1 or 5, It is characterized in that:The general switch can be substituted for front end management host, be communicated to connect with center switch.
CN201810157447.8A 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition and white list Pending CN108521399A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810157447.8A CN108521399A (en) 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition and white list

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810157447.8A CN108521399A (en) 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition and white list

Publications (1)

Publication Number Publication Date
CN108521399A true CN108521399A (en) 2018-09-11

Family

ID=63433291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810157447.8A Pending CN108521399A (en) 2018-02-24 2018-02-24 A kind of video monitoring safety cut-in method based on equipment feature recognition and white list

Country Status (1)

Country Link
CN (1) CN108521399A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110311809A (en) * 2019-06-12 2019-10-08 杭州迪普科技股份有限公司 The access terminal monitoring and managing method and device of video monitoring system
CN111031067A (en) * 2019-12-24 2020-04-17 上海中信信息发展股份有限公司 Monitoring data transmission method and device of distributed system and electronic equipment
CN111327577A (en) * 2018-12-17 2020-06-23 浙江宇视科技有限公司 Switch-based security access method and device
CN111372075A (en) * 2020-02-28 2020-07-03 钱秀华 Network image diagnosis method and device and image processing equipment
CN111491129A (en) * 2019-01-29 2020-08-04 深圳市共进电子股份有限公司 Network monitoring system, router operation method and device and router
CN111970141A (en) * 2020-06-30 2020-11-20 浙江远望信息股份有限公司 Office network hardware asset partitioning method based on similarity of IP address and MAC address
WO2022033381A1 (en) * 2020-08-11 2022-02-17 杭州海康威视数字技术股份有限公司 Connection control method, system and apparatus, and electronic device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118271A (en) * 2011-03-29 2011-07-06 上海北塔软件股份有限公司 Method for discovering illegally-accessed equipment
CN102333094A (en) * 2011-10-12 2012-01-25 杭州华三通信技术有限公司 Safety control method and equipment
CN105024999A (en) * 2015-06-02 2015-11-04 江苏恒信和安电子科技有限公司 IP video monitoring network security access method
CN106341656A (en) * 2016-08-31 2017-01-18 浙江远望信息股份有限公司 Video equipment monitoring method, device and system
US20170063882A1 (en) * 2015-08-26 2017-03-02 Microsoft Technology Licensing, Llc. Monitoring the life cycle of a computer network connection
CN106789935A (en) * 2016-11-29 2017-05-31 上海辰锐信息科技公司 A kind of terminal abnormal detection method
CN107302527A (en) * 2017-06-09 2017-10-27 北京奇安信科技有限公司 A kind of unit exception detection method and device
CN107395588A (en) * 2017-07-18 2017-11-24 浙江远望通信技术有限公司 Video monitoring accesses safe blocking-up method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102118271A (en) * 2011-03-29 2011-07-06 上海北塔软件股份有限公司 Method for discovering illegally-accessed equipment
CN102333094A (en) * 2011-10-12 2012-01-25 杭州华三通信技术有限公司 Safety control method and equipment
CN105024999A (en) * 2015-06-02 2015-11-04 江苏恒信和安电子科技有限公司 IP video monitoring network security access method
US20170063882A1 (en) * 2015-08-26 2017-03-02 Microsoft Technology Licensing, Llc. Monitoring the life cycle of a computer network connection
CN106341656A (en) * 2016-08-31 2017-01-18 浙江远望信息股份有限公司 Video equipment monitoring method, device and system
CN106789935A (en) * 2016-11-29 2017-05-31 上海辰锐信息科技公司 A kind of terminal abnormal detection method
CN107302527A (en) * 2017-06-09 2017-10-27 北京奇安信科技有限公司 A kind of unit exception detection method and device
CN107395588A (en) * 2017-07-18 2017-11-24 浙江远望通信技术有限公司 Video monitoring accesses safe blocking-up method and system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327577A (en) * 2018-12-17 2020-06-23 浙江宇视科技有限公司 Switch-based security access method and device
CN111327577B (en) * 2018-12-17 2022-10-04 浙江宇视科技有限公司 Switch-based security access method and device
CN111491129A (en) * 2019-01-29 2020-08-04 深圳市共进电子股份有限公司 Network monitoring system, router operation method and device and router
CN110311809A (en) * 2019-06-12 2019-10-08 杭州迪普科技股份有限公司 The access terminal monitoring and managing method and device of video monitoring system
CN111031067A (en) * 2019-12-24 2020-04-17 上海中信信息发展股份有限公司 Monitoring data transmission method and device of distributed system and electronic equipment
CN111372075A (en) * 2020-02-28 2020-07-03 钱秀华 Network image diagnosis method and device and image processing equipment
CN111372075B (en) * 2020-02-28 2021-03-05 上海营湾医疗科技有限公司 Network image diagnosis method and device and image processing equipment
CN111970141A (en) * 2020-06-30 2020-11-20 浙江远望信息股份有限公司 Office network hardware asset partitioning method based on similarity of IP address and MAC address
WO2022033381A1 (en) * 2020-08-11 2022-02-17 杭州海康威视数字技术股份有限公司 Connection control method, system and apparatus, and electronic device

Similar Documents

Publication Publication Date Title
CN108521399A (en) A kind of video monitoring safety cut-in method based on equipment feature recognition and white list
CN109729180B (en) Whole system intelligent community platform
CN108494737A (en) A kind of video monitoring safety cut-in method based on equipment feature recognition
CN100384150C (en) Method and system for preventing asynchronous ARP cache poisoning of multiple hosts
US8200798B2 (en) Address security in a routed access network
CN108521398A (en) A kind of video monitoring safety cut-in method based on equipment feature recognition, white list and constraint set flow control
US20130214901A1 (en) System, station and method for mustering
CN106465416A (en) Sensor network gateway
JP3618245B2 (en) Network monitoring system
US8184545B2 (en) Technique for combating loops in communication network
CN107395588A (en) Video monitoring accesses safe blocking-up method and system
JP2003069573A (en) System and method for managing network equipment using information recording medium
JP2002185539A (en) Ip communication network system having unauthorized intrusion protection function
CN108156043A (en) A kind of video monitoring safety cut-in method based on white list and constraint set flow control
CN101529862A (en) Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis
CN107276983A (en) A kind of the traffic security control method and system synchronous with cloud based on DPI
CN108629201A (en) A method of database illegal operation is blocked
CN112491888A (en) Method and system for preventing equipment from being falsely used
CN109150853A (en) The intruding detection system and method for role-base access control
CN103618613A (en) Network access control system
CN111970233A (en) Analysis and identification method for network violation external connection scene
CN101399814B (en) Method, system and device for verifying relation between data link layer address and sending side
CN112367315B (en) Endogenous safe WAF honeypot deployment method
CN101888296A (en) Method, device, equipment and system for detecting shadow user
CN103139056A (en) Secure gateway and network data interactive method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 311800 Jiyang city street, Jiyang, Zhuji, Shaoxing, Zhejiang (Jiyang Industrial Park)

Applicant after: Zhejiang Yuanwang Telecom Technology Co., Ltd

Address before: 311800 Shaoxing, Zhuji, Zhejiang Jiyang Road 98 North Ring Road No.

Applicant before: Zhejiang Yuanwang Telecom Technology Co., Ltd

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180911

RJ01 Rejection of invention patent application after publication